| 000 | 00847camuu2200241 a 4500 | |
| 001 | 000000798020 | |
| 005 | 20100920134959 | |
| 008 | 011130s2002 enka b 001 0 eng | |
| 010 | ▼a 1055938 | |
| 020 | ▼a 0470844930 (alk. paper) | |
| 040 | ▼a DLC ▼c DLC ▼d UKM ▼d C#P ▼d 211009 ▼d 244002 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a TK5105.59 ▼b .S7 2002 |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b S7822s | |
| 100 | 1 | ▼a Stajano, Frank. |
| 245 | 1 0 | ▼a Security for ubiquitous computing / ▼c Frank Stajano. |
| 260 | ▼a West Sussex, England ; : ▼b J. Wiley Sons, ▼c 2002. | |
| 300 | ▼a xix, 247 p. : ▼b ill. ; ▼c 25 cm. | |
| 440 | 0 | ▼a Wiley series in communications networking distributed systems |
| 504 | ▼a Includes bibliographical references (p. 204-243) and index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 중앙도서관/서고6층/ | 청구기호 005.8 S7822s | 등록번호 111229050 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 S7822s | 등록번호 121079698 (8회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 3 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 S7822s | 등록번호 151233511 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 중앙도서관/서고6층/ | 청구기호 005.8 S7822s | 등록번호 111229050 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 S7822s | 등록번호 121079698 (8회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 S7822s | 등록번호 151233511 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat
Computer sind allgegenwartige Begleiter unseres Alltags - in Telefonen, Waschmaschinen, Fernsehgeraten, Heizungssystemen, Smart Cards und vielen anderen Geraten. In diesem Buch wird beschrieben, wie alle diese Systeme uber drahtlose Netzwerke miteinander kommunizieren konnen. Insbesondere wird auf die derzeit entwickelten Techniken und Protokolle eingegangen, mit denen sich absichern laßt, daß die Systeme vor unberechtigtem Zugriff geschutzt sind und die Daten den richtigen Empfanger erreichen. Dieser Band ist weder ein "Kochbuch" mit Anleitungen zur Implementierung noch ein enzyklopadisches Handbuch. Es bietet Ihnen vielmehr einen Rahmen zum Verstandnis der Technologie, eine Kategorisierung der wichtigsten Probleme und eine tiefgrundige Diskussion einiger spezifischer Losungen. Nutzlich ist die allgemeine, gut verstandliche Einfuhrung in die Sicherheitstechnik und die Grundlagen der Kryptographie.
New feature
Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.
Features include:
* An introduction to the state of the art in ubicomp research.
* A readable primer on security and cryptology.
* An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
* "Peer-to-peer" and ad-hoc networking.
* An in-depth discussion of specific, cutting-edge solutions.
* An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.
정보제공 :
목차
About the Author.
Forward.
Preface.
Acknowledgements.
Contact Information.
1. Introduction.
Scenario.
Essential terminology.
Problems.
Notation.
2. Ubiquitous computing.
Xerox PARC.
Norman's Invisible Computer.
MIT.
HP's Cooltown.
ORL/AT&T Labs Cambridge.
Security issues.
3. Computer security.
Confidentiality.
Integrity.
Availability.
Authentication.
Security policies.
4. Authentication.
New preconditions.
The Resurrecting Duckling security policy model.
The many ways of being a master.
5. Confidentiality.
Cryptographic primitives for peanut processors.
Personal privacy.
6. Integrity.
Message integrity.
Device integrity.
7. Availability.
Threats to the communications channel.
Threats to the battery energy.
Threats from mobile code.
8. Anonymity.
The Cocaine Auction Protocol.
The anonymity layer.
9. Conclusions.
Appendix A: A Short Primer on Functions.
Appendix B: Existing Network Security Solutions.
Annotated bibliography.
Index.
정보제공 :
